Waltham, MA – December 3, 2014 – Today CloudLock is unveiling the CloudLock Security Fabric, a transformative unified cloud security solution that allows organizations to fully embrace the benefits of public cloud applications securely and in a completely non-invasive way. The Fabric extends cloud security capabilities for the more than five million enterprise users and the fifteen billion data points analyzed daily by CloudLock’s existing solutions. Focused on providing security insight across data, users and apps, the API-based, cloud-native architecture does not treat the cloud as a problem but as a business enabler. Contrary to traditional man-in-the-middle approaches, the SaaS-based CloudLock Security Fabric deploys in minutes, without requiring any hardware, agents or changes to the network environment.
The cloud economy continues to change the way users collaborate and how data is shared, and the adoption of public cloud applications shows no signs of slowing. Forrester projects that global public cloud purchases will grow from $72 billion in 2014 to $191 billion in 2020 (Source: Forrester, April 2014 - “The Public Cloud Market is Now in Hypergrowth”). While the cloud offers clear business productivity opportunities, organizations are seeking new approaches to secure sensitive corporate data.
“With CloudLock, companies have one unified security dashboard for their cloud apps”, said Gil Zimmermann, co-founder and CEO of CloudLock. “CloudLock is the cloud security backbone that transforms the way companies can adopt the cloud and support users, all while keeping their company’s data secure.”
The CloudLock Security Fabric gives organizations the visibility and control they need to protect sensitive data - payment card information (PCI), protected health information (PHI), personally identifiable information (PII), intellectual property (IP) - across a number of public cloud apps such as Google Apps, Salesforce, Dropbox, Box, ServiceNow and more than 9,000 connected cloud apps. CloudLock continuously monitors these apps in real time and detects and responds to security risk such as oversharing, inadvertent exposure, malicious data extraction and cyberthreats. CloudLock empowers organizations with a number of SmartActions or suggested behaviors to remediate security incidents in real time. For example, a policy violation could trigger end users to selectively encrypt sensitive information in files they have shared with external collaborators.
The CloudLock Security Fabric consists of eight core cloud security services:
Unlike man-in-the-middle approaches, CloudLock’s API-based cloud-native solution helps organizations protect their cloud environments directly in the cloud without forcing them to funnel traffic through gateways or reverse-proxy configurations, greatly enhancing time to value and accuracy. CloudLock not only continuously monitors cloud apps for security issues from the time of deployment but can also flag incidents retroactively as far back as the time the original cloud app was deployed.
CloudLock Security Fabric ships with the following APIs:
CloudLock is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage cloud apps they buy and build. CloudLock delivers security visibility and control for SaaS, IaaS, PaaS and IDaaS environments across the entire enterprise in seconds. Founded by Israeli Elite Cybersecurity Military Intelligence experts, the company delivers actionable cybersecurity intelligence through its data scientist-led CyberLab and crowdsourced security analytics across billions of data points daily. CloudLock has been recognized by Inc. Magazine as the fastest growing security product company in the U.S. and by Glassdoor as one of the top 3 best places to work in the U.S. Learn more at www.cloudlock.com.
See the CloudLock CASB & cloud cybersecurity solution in action from one of our cloud security experts
Your browser version is outdated.
We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!
Click on the icon below to download the latest version of your browserClose